2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt) 1
Secure and Reconfigurable Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT) Muhammad Junaid Farooq and Quanyan Zhu Department of Electrical & Computer Engineering, Tandon School of Engineering, New York University, Brooklyn, NY, USA, Emails: {mjf514, qz494}@nyu.edu. Abstract—The Internet of things (IoT) is revolutionizing the management and control of automated systems leading to a paradigm shift in areas such as smart homes, smart cities, health care, transportation, etc. The IoT technology is also envisioned to play an important role in improving the effectiveness of military operations in battlefields. The interconnection of combat equipment and other battlefield resources for coordinated automated decisions is referred to as the Internet of battlefield things (IoBT). IoBT networks are significantly different from traditional IoT networks due to the battlefield specific challenges such as the absence of communication infrastructure, and the susceptibility of devices to cyber and physical attacks. The combat efficiency and coordinated decision-making in war scenarios depends highly on real-time data collection, which in turn relies on the connectivity of the network and the information dissemination in the presence of adversaries. This work aims to build the theoretical foundations of designing secure and reconfigurable IoBT networks. Leveraging the theories of stochastic geometry and mathematical epidemiology, we develop an integrated framework to study the communication of mission-critical data among different types of network devices and consequently design the network in a cost effective manner. Index Terms—Battlefield, epidemics, internet of things, Poisson point process.
I. I NTRODUCTION The Internet of things (IoT) is an emerging paradigm that allows the interconnection of devices which are equipped with electronic sensors and actuators [1]. It allows for a higher level of situational awareness and effective automated decisions without human intervention. The concept has proven to be extremely useful in applications such as smart homes, energy management, smart cities, transportation, health care and other areas [2]. Recently, there is an interest in the defence community to leverage the benefits enabled by the IoT to improve the combat efficiency in battlefields and effectively manage war resources. This emerging area of using IoT technology for defence applications is being referred to as the Internet of battlefield things (IoBT) [3]. Fig. 1 illustrates a typical battlefield comprising of heterogeneous objects, such as soldiers, armoured vehicles, and aircrafts, that communicate with each other amidst cyber-physical attacks from the enemy. The IoBT has the potential to completely revolutionize modern warfare by using data to improve combat efficiency as well as reduce damages and losses by automated actions while reducing the burden on human war-fighters. Currently, the command, control, communications, computers, intelligence, surveillance and reconnaissance (C4 ISR) systems use millions of sensors deployed on a range of platforms to provide
978-3-901882-90-6/17 ©2017 IFIP
Fig. 1: A typical IoBT network with heterogeneous battlefield things and random enemy attacks. Battlefield devices interact with other devices within their communication range in a D2D manner for exchange of mission critical information. The link shape illustrates the piece of information being shared. situational awareness to military commanders and troops, on the ground, seas, and in the air [4]. However, the real power lies in the interconnection of devices and sharing of sensory information that will enable humans to make useful sense of the massive, complex, confusing, and potentially deceptive ocean of information. In the battlefield scenarios, the communications between strategic war assets such as aircrafts, warships, armoured vehicles, ground stations, and soldiers can lead to improved coordination, which can be enabled by the IoBT [5]. However, to become a reality, this vision will have to overcome several technical limitations of current information systems and networks. Most civilian IoT applications such as smart homes and cities are infrastructure based, where the devices are connected to each other and the internet via an access point or gateway. In the battlefield scenario, the communication infrastructure such as cellular networks or base stations may not be available. Hence, the battlefield things need to exploit device-to-device (D2D) communications [6] to share information with other things1 . Therefore, the information sharing can be affected by the physical parameters of the network such as the transmission power of the things, the number of deployed things, their locations, and the flexibility of communication between different types of things. In addition to these factors, another impediment in the connectivity of battlefield things is the susceptibility to cyber-physical attacks. The information exchange between things may be affected by several factors such as jamming of radio frequency channels, physical attacks on 1 We use the terms “things” and “devices” interchangeably to refer to battlefield things throughout the paper.
2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)
Type 1 device
infrastructure, node failures due to attacks on power sources, or lack of power, etc. Since the analytics and automated decisions in an IoBT network rely on the real-time data provided by sensors deployed in the battlefield, we need to ensure the spread of information in the networks with a certain level of reliability and security to make accurate decisions.
m=1
Type 2 device Type M device
r1 m=2
r2
m=M rM
Although the IoBT has to do to with much more beyond the connectivity of battlefield things, such as digital analytics and automated response, which allows the systems to react more quickly and precisely than humans; however, the connectivity aspect is vital in allowing the IoBT systems to unleash their full potential. It is ideal if we can achieve complete situational awareness and perfect information spreading throughout the network. However, due to limited available resources, incurred costs (capital and operational), and vulnerability to attacks, it is not practical and hence requires a cost-effective, secure and reconfigurable network design. Therefore, in this paper, we first characterize the information dissemination in an IoBT network and use it to design the network parameters to achieve mission specific performance goals with minimal amount of resources. Stochastic geometry (SG) based models have been successfully used in the modeling and analysis of traditional wireless networks such as cellular networks [7] and ad-hoc wireless sensor networks [8]. These models accurately capture the effect of spatial distribution of network devices and characterize the resulting performance. On the other hand, epidemic models [9] have been studied extensively for analyzing the spread of viruses in computers, rumours in humans, and infectious diseases in biological networks [10]–[12]. Although these models are highly useful in capturing certain aspects of the networks, none of them captures the unique characteristics of IoBT networks. The SG models lack the capability of analysing the dynamics of information dissemination in networks. While a percolation study for SG models is available to determine the connectivity of the network (as shown in [8]), however, it does not capture the dynamics of information dissemination and the effects of cyber-physical attacks. On the other hand, epidemic models fail to incorporate the geometry of the network and hence cannot give meaningful insights in physically deployed communication networks. Moreover, there are few descriptive models available in literature for designing IoT networks, most of which are developed for civilian applications [13] and do not incorporate the ad hoc nature of IoT networks over battlefields. Hence, it is imperative to develop an integrated design framework that can capture the unique characteristics of IoBT networks. In this paper, we develop a SG based model to characterize the connectivity of IoBT networks in terms of the degree distribution. We then use an epidemic spreading model to capture the dynamic information dissemination within and across networks of devices at the equilibrium state. The resulting integrated open-loop system model is used as a basis for reconfiguring the network parameters to ensure a missiondriven information spreading profile in the network.
Fig. 2: Heterogeneous IoBT network decomposed into virtual layers, each containing devices of the same type. II. S YSTEM M ODEL In this section, we first describe the geometry of the IoBT network and propose an abstraction model using tools from stochastic geometry. Then, we model the spread of information in the heterogeneous IoBT network inspired from mathematical epidemiology. A. Network Geometry We consider a heterogeneous adhoc wireless network composed of M different types of devices. Each device corresponds to a different battlefield thing such as a soldier equipped with smart devices, armoured vehicle, ground station, unmanned aerial vehicle (UAV), etc. The different types of devices are characterized by their transmission power or equivalently, the communication range rm in meters and the uniform deployment density in R2 denoted by λm devices per km2 , ∀m = 1, . . . , M . The communication range of the min max min devices is tunable in the interval [rm ,rm ], where rm ≥0 min max and rm ≥ rm , ∀m = 1, . . . , M . The devices of type m can be abstracted as a homogeneous Poisson Point Process2 (PPP) [14] of intensity λm , denoted by Φm . Assuming that each type of device is placed independently of the other types, the combined IoBT network can be represented PM as a PPP of intensity Λ3 , denoted by Φ, where Λ = m=1 λm . Due to the absence of traditional communication infrastructure such as base stations, the devices are only able to communicate using D2D communications, i.e., device xm of type m can communicate with a device yn of type n only if kxm − yn k ≤ rm and vice versa, where k.k represents the Euclidean distance. Hence, the communication links between devices can be modeled using a random geometric graph (RGG) [15] with a given connection radius. For the ease of exposition of the network and connectivity between different type of devices, we virtually decompose the network into M layers, where each layer contains a different type of device. An illustrative representation of the network model is provided in Fig. 2. The connectivity between things of the same type, labeled as intra-layer connectivity, the connectivity between different type of things, labeled as inter-layer connectivity, and the combined network connectivity are explained in the subsequent subsections. 2 The PPP assumption reflects the lack of structure in the spatial distribution of the nodes and is appropriate to use in the case of a large number of nodes where it is difficult to keep track of the topology. 3 This result follows from the superposition theorem of PPPs [14].
2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)
B. Network Connectivity In this subsection, we describe the connectivity between the heterogeneous things in an IoBT network. The connectivity of devices can be classified into intra-layer, inter-layer, and combined network connectivity, which are explained as follows: 1) Intra-layer Connectivity: Within a particular network layer m, devices can communicate with each other if they are within a distance of rm of each other. The set of communication neighbours of a typical device of type m, referred to as xm , can be expressed as Nm (xm ) = {ym ∈ Φm : kxm − ym k ≤ rm }. The connectivity of the RGG formed by devices of type m is characterized by the degree of the devices, denoted by Km , which is defined as the average number of neighbours of each device, i.e., Km = |Nm (xm )|, where |.| represents the set cardinality. Due to the PPP assumption, the intra-layer degree, is a Poisson random variable in the mean field, and can be expressed by the following lemma: Lemma 1. The intra-layer degree distribution of network layer m can be expressed as follows: 2 k 2 (λm πr m) , k ≥ 0, (1) P(Km = k) = e−λm πrm k! for sufficiently large λm and rm . The average intra-layer 2 degree of layer m can be expressed as E[Km ] = λm πrm . From Fig. 2, it is easy to see that the average degree, or equivalently the connectivity, depends on the density of the deployed devices as well as the communication range. 2) Inter-layer Connectivity: The devices in one network layer can communicate with the devices in other network layers that are inside their region of influence. The region of influence of a typical node at each layer is illustrated by the projected circles as shown in Fig. 2. The set of devices of layer n under the influence of a typical device at layer m can be expressed as Nmn (xm ) = {y ∈ {Φm ∪Φn } : kxm −yk ≤ rm }. The inter-layer degree between layer m and n, denoted by Kmn 4 , can be expressed as Kmn = |Nmn (xm )|. Note that the inter-layer degree is not symmetric, i.e., Kmn 6= Knm . We assume reciprocity of communication between different devices which is formally stated in Assumption 1. Assumption 1. We assume that the devices that are under the influence of each other can communicate bi-directionally. In practice, this can be realized using different radio interfaces or protocols for communicating between different types of devices. The inter-layer degree distribution is expressed by the following lemma. Lemma 2. The probability distribution of the inter-layer degree between devices of layer m and n, denoted by Kmn , can be written as follows: 2 k 2 ((λm + λn )πr m) P(Kmn = k) = e−(λm +λn )πrm , k ≥ 0, k! (2) and the average inter-layer degree can be expressed as 2 E[Kmn ] = (λm + λn )πrm . 4 With a slight abuse of notation, we denote K m as the average intra-layer degree of devices in layer m and Kmn as the average inter-layer degree between layer m and n.
3) Combined Network Connectivity: The total network connectivity is characterized by the average degree of the combined network. In the combined network, where all types of devices are able to communicate with each other using Assumption 1, the degree of each device is evaluated to be the total number of devices of all types inside its area of influence. The average total network degree is distributed as a multi-modal Poisson random variable and can be expressed by the following lemma. Lemma 3. The degree of the combined network, denoted by Ko , is distributed as follows: M 2 k 2 (Λπr 1 X m) λm e−Λπrm , k ≥ 0, (3) P(Ko = k) = Λ m=1 k! PM where Λ = m=1 λm . The average degree of the combined PM 2 . network can be expressed as E[Ko ] = m=1 λm πrm Proof. See Appendix A
C. Information Dissemination Each type of device in the IoBT network generates data which needs to be propagated to other devices of the same type and/or different types of devices depending on the role of that device. There are certain pieces of information that needs to be shared among the same type of devices, e.g., soldiers need to communicate certain information with other soldiers. On the other hand, there are pieces of information that needs to be propagated from one network to the other, e.g., sensors transmitting data to a control network. Moreover, some information might be important for all network nodes such as network health monitoring data or network discovery beacons. We assume a time slotted system, in which the devices communicate with other devices for a duration of τ s. The effective information spreading rate between any two devices within the communication range, denoted by α, can be expressed as: α = γ × (1 − δ), (4) where γ is the contact rate, i.e., the total number of transmission attempts made in the interval τ , and δ is the probability of unsuccessful transmission due to cyber-physical attacks, which we will refer to as threat level. Without loss of generality, we can select the contact rate γ = 1, so effectively, α = 1 − δ is the probability of successful information transmission between devices5 . We assume a uniform threat level for all network devices. Characterizing the threat level in battlefield scenarios due to jamming and physical attacks, or other adversarial actions has been explored in literature, e.g., [16] and [17], and is beyond the scope of the current work. The dynamics of information dissemination under a given threat level can be described as follows: 1) Information Dynamics: The devices in the network spread information from one device to another in a broadcast manner in each time slot. This process is repeated in all the time slots and the devices can either be in an uninformed state or an informed state depending on the success of information 5 There
is no loss of generality since τ can be made arbitrarily small.
2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)
delivery. To model this behaviour and explain the dynamics of information dissemination across the IoBT network, we use the susceptible-infected-susceptible (SIS) model [18], which is well studied in mathematical epidemiology. The information dissemination in the network is directly related to the average degree of the network, as described in Section II-B, which in turn depends on the physical network parameters. Since the network is random with potentially large number of devices, we use the degree based mean-field approach, in which all devices are considered to be statistically equivalent in terms of the degree and the analysis is done on a typical device. The information dissemination dynamics for a typical device can therefore be written as follows [19]: (i) dIk (t) (i) (i) = −Ik (t) + αk(1 − Ik (t))Θ(i) (t), (5) dt (i) where Ik (t) denotes the density of informed devices at time t with degree k and information strand i ∈ {m, mn, o}, ∀m, n = 1, . . . , M . Remark 1. A strand m refers to a message or piece of information propagating in the network of devices of type m. By extension, strand mn refers to the inter-layer information between devices of type m and n that originates from layer n. Finally, strand o refers to the global information that is shared by all devices. The first term in (5) explains the annihilation of information with time, i.e., the informed devices return to the uninformed state at a rate of unity. The second term accounts for the creation of informed nodes due to the spreading. The rate of increase in the density of informed nodes with degree k is directly proportional to the degree, the probability of successful transmission of information α, the probability that (i) the node with degree k is not informed, i.e., (1 − Ik (t)), and the average probability that a neighbour of a device with degree k is informed, denoted by Θ(i) (t). In our case, since the network is PPP, i.e., uncorrelated, Θ(i) (t) can be expressed as follows: X kP(Ki = k) (i) Θ(i) (t) = Ik (t), i ∈ {m, mn, o}, (6) E[Ki ] k≥0
where P(Ki = k) and E[Ki ] are evaluated in Section II-B. 2) Steady State Analysis: We are interested in determining the steady state of the information dissemination. To this end, dI
(i)
(t)
we impose the stationarity condition, i.e., set kdt = 0. It results in the following expression: αkΘ(i) (α) (i) Ik = , i ∈ {m, mn, o}. (7) 1 + αkΘ(i) (α) Notice that Θ(i) (α) is now a constant that depends on α. Now, (6) and (7) present a system of equations that needs to be solved self-consistently to obtain the solution for Θ(i) (α) (i) and Ik . In the subsequent section, we deal with the solution of the dynamical information spreading process for the IoBT network. III. M ETHODOLOGY In this section, we first present a solution to the dynamical information spreading system in IoBT networks and then use it
for the efficient design of IoBT networks for mission-specific battlefield applications. A. Equilibrium Analysis Equilibrium analysis provides us with the steady-state situation of the information in the network. Although, with the changes in network topology and other network configurations, the actual information spread might be different; however, the equilibrium state provides us with a reasonable understanding of the system behavior. In order to find the equilibrium solution, we need to solve the self-consistent system expressed in (6) and (7). In fact, it reduces to obtaining a solution to the following fixed-point system: αkΘ(i) (α) 1 X kP(Ki = k) , (8) Θ(i) (α) = E[Ki ] 1 + αkΘ(i) (α) k≥0 for i ∈ {m, mn, o}, ∀m, n = 1, . . . , M . An obvious solution for this fixed-point system is Θ(i) (α) = 0; however, it is trivial. It can be shown that (8) may have at least one solution in the domain Θ(i) (α) > 0 depending on the value of α (See Appendix B). The condition for this bifurcation to hold is E[Ki ] α ≥ E[K 2 . We show that this bifurcation point is unique in i] the domain 0 < Θ(i) (α) ≤ 1 (See Appendix C). Obtaining this solution in closed form for a PPP setting is not always possible due to the complicated form of P(Ki = k). Hence, an approximate solution can be obtained using the following theorem: Theorem 1. If a non-zero solution exists for the information E[Ki ] spreading dynamics in (6) and (7), i.e., α ≥ E[K 2 , then for i] E[Ki ] 1, a lower bound approximation of the average probability that a neighbour of a device with degree k is informed, can be expressed as follows: 1 (i) ˆ (α) ≈ max 0, 1 − , (9) Θ αE[Ki ] Proof. See Appendix D. As shown in Appendix D, the solution is a lower bound for the true solution and becomes a tight approximation for E[Ki ] 1. In the IoBT network, the physical interpretation of E[Ki ] is the average number of communication neighbours of a device related to information strand i ∈ {m, mn, o}. It is reasonable to assume that E[Ki ] 1 due to the potential high density of devices in IoBT networks and hence, the solution presented in Theorem 1 is indeed a good approximation to the true solution. The corresponding solution for the density of (i) informed devices Iˆk can be obtained by substituting (9) into (7). The average density of informed devices with information strand i can then be evaluated X (i)as: (i) ˆ I = Iˆk P(Ki = k). (10) k≥0
B. Secure and Reconfigurable Network Design Once the equilibrium point for the information dissemination has been determined, the next step is to design the IoBT network to achieve mission specific goals while efficiently using battlefield resources. In essence, the network design implies tuning the knobs of the network, which in the case
2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)
of IoBT networks are the transmission ranges and the node deployment densities of the different types of battlefield things. The problem is eventually to find the modes of the intra-layer and iter-layer degree distributions of the network. The objective is to ensure a certain information spreading profile in the network while deploying the minimum number of devices and using the minimum transmit power. Let λ = [λ1 λ2 . . . λM ]T represent the vector of device deployment densities and r = [r1 r2 . . . rM ]T be the vector of communication ranges of each of the devices in the IoBT network. The minimum density of each device in the network, determined by the mission T . . . λmin requirements, is denoted by λmin = [λmin λmin 1 2 M ] , min λm ≥ 0, ∀m = 1, . . . , M . The maximum deployment density of each device, defined by the capacity of the available T devices, is denoted by λmax = [λmax λmax . . . λmax 1 2 M ] , max min λm ≥ λm , ∀m = 1, . . . , M . Similarly, the tunable transmission range limits of the devices can be expressed as min T min rmin = [r1min r2min . . . rM ] , rm ≥ 0, ∀m = 1, . . . , M , max max max max T max min and r = [r1 r2 . . . rM ] , rm ≥ rm , ∀m = PM T 1, . . . , M . If w = [w1 w2 . . . wM ] such that m=1 wm = 1 represents the weight vector corresponding to the relative capital cost of deploying each type of device, and p represents the unit operational power cost signifying the importance of network power consumption, then a cost function for the network with densities λ and transmission ranges r can be expressed as follows: M M X X η c(λ, r) = wm λm A + p λm Arm , (11) m=1
m=1
where A represents the area of the battlefield in km2 and η denotes the path-loss exponent6 . The first term represents the total deployment cost of all the network devices while the second term represents the total energy cost of operating all the devices with transmission range r. The weights w can depend on several factors such as the time required for deployment, the monetary cost involved, or the number of devices available in stock, etc. We can then formulate the secure and reconfigurable network design problem as follows: minimize c(λ, r) (12) λ,r
subject to
I
(m)
I
(mn)
I
(o)
≥ Tm , m = 1, . . . , M,
(13)
≥ Tmn , (m, n) = 1, . . . , M,
≥ To ,
min
(14) (15)
max
min
max
λ ≤λ≤λ ,r ≤r≤r , (16) where Ti ∈ [0, 1], i ∈ {m, mn, o}, are the desired missionspecific intra-layer, inter-layer, and global network information spreading thresholds. Since the knobs for certain types of devices in the network may not be tunable, we do not have complete freedom in selecting the parameters to minimize the cost function. This constrained action space can be incorporated into the optimization by setting λmin = λmax or m m min max rm = rm for any type m device for which the parameter is not tunable. Since computing Iˆ(i) in (10) in closed form is not possible due to the form of P(Ki = k) for the considered network, obtaining a solution of the constrained optimization problem in eqs. (12) to (16) is intractable. Therefore, we 6 The
η power consumption of a device of type m is proportional to rm .
TABLE I: Physical Parameter Ranges. Deployment Density (km−2 )
Transmission Range (m)
λmin 1
λmax 1
λmin 2
λmax 2
r1min
r1max
r2min
r2max
0.1
10
1
40
100
1000
10
500
propose a sub-optimal approach to avoid this intractability while still yielding a plausible solution. Instead of ensuring that the average densities of informed devices Iˆ(i) exceeds the respective thresholds Ti , i ∈ {m, mn, o}, we impose a constraint on the densities of informed devices that possess a degree equal to the average degree of the network. In (i) other words, we ensure that IˆE[Ki ] ≥ Ti0 for some Ti0 < Ti , i ∈ {m, mn, o}. It is reasonable because the proportion of devices with the mean degree contribute the most in the average information spreading. The resulting problem, after substituting the required expressions from Lemma 1, 2, and 3, simplifies to the following: minimize c(λ, r) (17) λ,r
1 , ∀m = 1, . . . , M, (18) 0 ) α(1 − Tm 1 ≥ , ∀(m, n) = 1, . . . , M, 0 ) α(1 − Tmn (19)
2 subject to λm πrm ≥ 2 (λm + λn )πrm
M X m=1 min
2 λm πrm ≥
1 , α(1 − To0 )
(20)
λ ≤ λ ≤ λmax , rmin ≤ r ≤ rmax . (21) Note that the objective and constraints are biconvex in the feasible solution space, i.e., λmin ≤ λ ≤ λmax , rmin ≤ r ≤ rmax with λmin ≥ 0 and rmin ≥ 0. Hence, the problem can be solved using constrained biconvex programming techniques [20]. The battlefield area A is a common factor in the objective function and can be safely removed from the optimization problem. IV. R ESULTS In this section, we provide the results obtained by testing the developed framework under different battlefield missions. For the ease of interpretation of results, we assume a bi-layer IoBT network comprising of M = 2 types of battlefield things. The first type of devices is assumed to be commanders and the second type is assumed to be followers. The assumption yields a simple yet natural network configuration in a battlefield, e.g., being composed of soldiers and distributed commanding units. Let m = 1 correspond to the commander layer of the network and m = 2 correspond to the follower layer. The allowable physical parameter ranges of the respective devices are selected as in Table I unless otherwise stated. The parameters imply that the commanders have a higher transmission range but lower deployed density while the followers have a smaller communication range but higher deployment density. In practice, the limits can be based on tactical requirements of the missions. The weights representing the relative deployment cost are chosen to be w1 = 0.8 and w2 = 0.2 implying that the deployment cost of the commanding units is much higher than the follower units. The unit cost of power p is selected
2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)
T 1 = 0 , T 2 = 0 .7, T 12 = 0 .8, T 21 = 0 , T o = 0 .7
500
400
300
0.2
0.3
0.4
0.5
0.6
0.7
0.8
35
λ1
180
λ2
160
30
Cost Function
Deployment Density (devices/km2)
Transmission Range (m)
r2
600
200 0.1
200
40
r1 700
T 1 = 0 , T 2 = 0 .7, T 12 = 0 .8, T 21 = 0 , T o = 0 .7
T 1 = 0 , T 2 = 0 .7, T 12 = 0 .8, T 21 = 0 , T o = 0 .7
800
25 20 15
140 120 100 80 60
10
40 5 0 0.1
0.9
20 0.2
0.3
Threat level, δ
0.4
0.5
0.6
0.7
0.8
0 0.1
0.9
0.2
0.3
(a) Transmission ranges against threat level.
0.4
0.5
0.6
0.7
0.8
0.9
Threat level, δ
Threat level, δ
(b) Deployment densities against threat level.
(c) Cost function against threat level.
Fig. 3: Optimal network parameters for the intelligence mission. T 1 = 0 .6, T 2 = 0 , T 12 = 0 , T 21 = 0 .7, T o = 0 .7
T 1 = 0 .6, T 2 = 0 , T 12 = 0 , T 21 = 0 .7, T o = 0 .7 40
900
Device Intensity (devices/km2)
Transmission Range (m)
r1 r2
800
700
600
500
400 0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
Threat level, δ
35 30
70
λ1
T 1 = 0 .6, T 2 = 0 , T 12 = 0 , T 21 = 0 .7, T o = 0 .7
60
λ2
50
Cost Function
1000
25 20 15
40 30 20
10 10
5 0 0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
0 0.1
0.2
Threat level, δ
(a) Transmission ranges against threat level.
(b) Deployment densities against threat level.
0.3
0.4
0.5
0.6
0.7
0.8
0.9
Threat level, δ
(c) Cost function against threat level.
Fig. 4: Optimal network parameters for the encounter mission. according to the importance of each mission and the path-loss exponent η = 4. A. Mission Scenarios In the battlefields, there can be several types of missions such as intelligence, surveillance, encounter battle, espionage, reconnaissance, etc. In our results, we will focus particularly on the two most common mission scenarios, i.e., intelligence and encounter battle. Both of them have completely different requirements in terms of the information flow in the network, which are described as follows: 1) Intelligence: In the intelligence mission, the goal is to provide commanders with the information from a range of sources to assist them in operational or campaign planning. It implies that there is a need for strong coordination in the follower network, i.e., soldiers and other sensors, as well as reliable flow of information from the follower network to the commander network. The coordination among commander network may not be that critical. Hence, to emulate such an intelligence mission, we select the following set of information spreading thresholds: T1 = 0, T2 = 0.7, T12 = 0.8, T21 = 0, and To = 0.7. The unit cost of power is selected to be high, i.e., p = 40, which signifies the preference of the network to spend less on power consumption during intelligence. The optimal physical parameters obtained for the intelligence mission against increasing threat level δ are shown in Fig. 3. There are several interesting observations in the intelligence mission. A general trend is that the required transmission ranges and deployment densities increases as the threat level increases. Consequently, the cost function, which signifies the
deployment and operation cost of the network, also increases as shown in Fig. 3(c). Fig. 3(a) and Fig. 3(b) show that the transmission range of the commanders is always higher than the followers while the densities of the followers is higher than that of the commanders. This observation makes sense as the followers equipped with sensors should be more in the total number while the commander network should have a larger influence area to be able to gather information for the intelligence mission. Another important observation is that the framework tends to increase the deployment density of the devices first before increasing their transmission ranges. It is due to a high cost of power consumption that tends to force the devices to minimize the transmission ranges. 2) Encounter Battle: In the encounter battle or meeting engagement scenario, there is a contact between the battling forces. In such situations, commanders need to act quickly to gain advantage over the opponents. This requires robust information spreading from the command network to the follower network. Hence, there is a need for strong coordination among commanders and a reliable information flow from commanders to followers. Additionally, the common status information sharing between all network devices must be high to ensure accurate decision-making. Therefore, we set the following information spreading thresholds: T1 = 0.6, T2 = 0, T12 = 0, T21 = 0.7, and To = 0.7. In addition, the unit cost of power is selected to be low, i.e., p = 8, which implies a willingness of the network to spend more on power consumption during the encounter battle. Also, we fix the deployment density of the commanding devices as λmin = λmax = 5 km−2 since 1 1 it may not be practical to increase or decrease the number of commanders during an encounter battle. The resulting optimal
2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)
parameters against the changing threat level are presented in Fig. 4. In contrast with the intelligence mission, the framework tends to increase the transmission ranges of the devices first before increasing deployment, in the encounter battle. This observation is a result of the lower unit power cost for the encounter battle. Fig. 4(a) shows that the transmission range of the commanders and followers increases as the threat level increases until the capacity of the follower devices is reached at δ = 0.4. To counter higher levels of threat, the framework increases the deployment of follower nodes while the density of commanders is fixed as shown in Fig. 4(b). Once the threat level is higher than δ = 0.7, the transmission range of the followers is actually reduced to decrease power cost as increasing the device density is directly related to the power consumption. The cost function for the encounter battle in Fig. 4(c) is lower than the intelligence mission in Fig. 3(c) mainly due to the difference in power cost. Many other interesting mission scenarios can be emulated by defining the information thresholds as well as the physically constrained network parameters. Moreover, further insights can be obtained by investigating the behaviour of the system with more sophisticated network structure, i.e., more types of devices and their respective roles. However, in this work, we do not delve into these details since they are specific to the battlefield missions and the actual combat equipment used in the battlefields. V. C ONCLUSION & F UTURE W ORK In this paper, we have presented a generic framework for secure and reconfigurable design of IoT empowered battlefield networks. The framework provides a tractable approach to tune the physical network parameters to achieve the desired realtime data dissemination among different types of battlefield devices according to the assigned missions. It takes into account the perceived threat level from the opponent as well as the costs involved in deployment and operation of combat equipment to provide a robust and cost effective design of communication networks in battlefields which can be highly useful in military planning. Optimized network parameters are provided for the two typical mission scenarios of intelligence and encounter battle in which the desired information spreading direction is completely opposite to one another. Results have shown that the mission goals can be achieved by either changing the deployment of combat units or by changing their transmission powers or both in response to a changing threat perception, according to the design preferences. Although, the IoT is being widely accepted and appreciated by the commercial sector due to the huge economic impact, the military is still reluctant to adopt this technology due to the privacy and security issues. The main concern is that without proper safeguards, this linkage of systems provided by IoBT could be compromised leading to disastrous consequences. Hence, the privacy and security aspects of IoBT are one of the major challenges that need to be addressed by the researchers. A PPENDIX A P ROOF OF L EMMA 3 Let x denote a typical device in the combined network. The probability that device x has a degree k can be expressed as
follows: P(x ∈ Φm )P(Ko = k|x ∈ Φm ) (22) Now, P(x ∈ Φm ) = λΛm and P(Ko = k|x ∈ Φm ) = 2 2 k exp(−Λπrm )(Λπrm ) . k!
Substituting these in (22) and summing over all possible values of m proves the result. A PPENDIX B P ROOF OF E XISTENCE The non-zero equilibrium solution can be obtained by solving the following equation: Ki2 α 1 E . (23) 1= E[Ki ] h 1 + Ki αΘ(α) i K2α
1 E 1+Ki iαΘ(α) . We need to find a Let h(Θ(α)) = E[K i] solution to the equation h(Θ(α)) = 1 in the domain 0 < Θ(α) ≤ 1. It is clear that h(Θ(α)) is monotonically decreasing for Θ(α) > 0. Therefore, it is sufficient to show that h(0) > 1 and h(1) < 1 for a non-zero solution to exist for the equation h(Θ(α)) = 1. This result is proved below: 1 E[Ki2 ] h(0) = E Ki2 α = α , (24) E[Ki ] E[Ki ] 1 Ki2 α 1 Ki α h(1) = E = E Ki , E[Ki ] 1 + Ki α E[Ki ] 1 + Ki α 1 E[Ki ] = 1. (25) < E[Ki ] In (25), the inequality follows from the fact that Ki α < 1, ∀Ki > 0, α > 0. A non-zero solution to 1+Ki α E[Ki ] (23) exists only if h(0) ≥ 1, which implies that α ≥ E[K 2] . i
A PPENDIX C P ROOF OF U NIQUENESS To prove that the fixed point equation described by (8) has a unique solution in the domain Θ(i) > 0, we make use of the Banach fixed-point theorem (or contraction mapping theorem) [21]. We prove that thefunctional 1 Ki2 αΘ(α) F (Θ(α)) = E (26) E[Ki ] 1 + Ki αΘ(α) experiences a contraction for all Θ(α) ∈ (0, 1]. More precisely, we prove that |F (Θ1 (α)) − F (Θ2 (α))| ≤ c|Θ1 (α) − Θ2 (α)| for any Θ1 (α), Θ2 (α) ∈ [0, 1], where 0 ≤ c < 1. The fact that the constant c is strictly less than 1 implies that the functional is contracted. The proof is as follows: |F (Θ1 (α)) − F (Θ2 (α))| = 1 Ki2 αΘ1 (α) 1 Ki2 αΘ2 (α) E − E , E[Ki ] 1 + Ki αΘ1 (α) E[Ki ] 1 + Ki αΘ2 (α) |Θ1 (α) − Θ2 (α)| Ki2 α = E . E[Ki ] (1 + Ki αΘ1 (α))(1 + Ki αΘ2 (α)) (27) To complete the proof, we need to show that 1 Ki2 α E < 1, (28) E[Ki ] (1 + Ki αΘ1 (α))(1 + Ki αΘ2 (α)) K2α
i Let g(Ki ) = (1+Ki αΘ1 (α))(1+K . It can be proved i αΘ2 (α)) that g(Ki ) is concave for Ki ≥ 0 by showing that g 00 (Ki ) < 0, ∀Ki ≥ 0. Therefore, using Jensen’s inequal-
2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)
A PPENDIX D P ROOF OF T HEOREM 1 Obtaining the non-zero solution for the fixed point equation (8) in closed form is not possible since we need to solve the following equation for Θ(α): ∞ Ki2 α 1 X P (Ki ), (31) 1= E[k] 1 + Ki αΘ(α) k=0 2
e−λi πri (λi πri2 )K i . Ki !
where P (Ki ) = Therefore, we resort to find an approximation for the solution which is asymptotically acK2α curate. Let g(Ki ) = 1+Ki iαΘ(α) . Since g 00 (Ki ) > 0, ∀Ki ≥ 0, so g(Ki ) is a convex function for Ki ≥ 0. Using Jensen’s inequality, we can say that E[g(Ki )] ≥ g(E[Ki ]), with equality only if Ki isdeterministic. This implies the2 following: Ki2 α E[Ki ] α . (32) E > 1 + Ki αΘ(α) 1 + E[Ki ]αΘ(α) Therefore, we can write (31) as follows: E[Ki ]α 1> , (33) 1 + E[Ki ]αΘ(α) which leads to the final solution, 1 Θ(α) > 1 − . (34) αE[Ki ] Using our prior knowledge that Θ(α) ≥ 0, we need to ensure that αE[Ki ] ≥ 1. In general, the complete solution can be 1 expressed as Θ(α) > max(0, 1 − αE[K ). To measure the i] accuracy of this bound, we solve the fixed-point equation exactly using an fixed-point iteration and compare the results for different values of α and E[Ki ] = λi πri2 . We choose a fixed ri = 0.2 km and λi = [25, 50, 100] km− 2, which results in E[Ki ] = [3.14, 6.28, 12.57]. A plot of the results is provided in Fig. 5. It can be observed that the lower bound obtained using Jensen’s inequality is tight for all values of α when E[Ki ] 1. R EFERENCES [1] D. Evans, “The Internet of Things: How the Next Evolution of the Internet Is Changing Everything,” Cisco Inc., White Paper, 2011. [2] The Internet Of Things: Mapping the Value Beyond the Hype. Mckinsey Global Institute, 2015.
1
Exact Solution Approximation
0.9 0.8
E[K i] = 12.57
0.7 E[K i] = 6.28
0.6
Θ (α )
ity [22], we can say that E[g(Ki )] ≤ g(E[Ki ]), with equality iff Ki is deterministic. It follows that Ki2 α 1 E < E[Ki ] (1 + Ki αΘ1 (α))(1 + Ki αΘ2 (α)) E[Ki ]α = (1 + E[Ki ]αΘ1 (α))(1 + E[Ki ]αΘ2 (α)) 1 . (29) Θ1 (α) + Θ2 (α) + E[Ki ]αΘ1 (α)Θ2 (α) + E[K1i ]α The expression in (29) is strictly less than 1 only if the following condition is satisfied: 1 Θ1 (α) + Θ2 (α) + E[Ki ]αΘ1 (α)Θ2 (α) + > 1. (30) E[Ki ]α The condition in (30) depends on the relative magnitudes of the quantities E[Ki ] and α. Regardless, it reveals that we need to exclude the values of Θ(α) that are too close to zero. For sufficiently large values of Θ(α), it is clear from (30), that F (Θ(α)) is indeed a contraction with respect to the absolute value metric. Hence, by the contraction mapping theorem, F (Θ(α)) has a unique fixed point in the domain Θ(α) > 0.
0.5 E[K i] = 3.14
0.4 0.3 0.2 0.1 0 0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Information spreading rate, α
Fig. 5: Accuracy of Jensen’s lower bound. [3] “The Internet of Things For Defense,” Wind River Systems, 2015. [4] N. A. Stanton and C. Baber, Modelling Command and Control: Event Analysis of Systemic Teamwork. CRC Press, 2008. [5] N. Suri, M. Tortonesi, J. Michaelis, P. Budulas, G. Benincasa, S. Russell, C. Stefanelli, and R. Winkler, “Analyzing the applicability of internet of things to the battlefield environment,” in Intl. Conf. Mil. Commun. and Inf. Sys. (ICMCIS 2016), Brussels, Belgium, May 2016. [6] O. Bello and S. Zeadally, “Intelligent device-to-device communication in the internet of things,” IEEE Syst. J., vol. 10, no. 3, pp. 1172–1182, Sept 2016. [7] J. G. Andrews, F. Baccelli, and R. K. Ganti, “A tractable approach to coverage and rate in cellular networks,” IEEE Trans. Commun., vol. 59, no. 11, pp. 3122–3134, Nov. 2011. [8] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, “Stochastic geometry and random graphs for the analysis and design of wireless networks,” IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029–1046, Sep. 2009. [9] F. Brauer, P. van den Driessche, and J. Wu, Eds., Mathematical Epidemiology. Germany: Springer Berlin Heidelberg, 2008. [10] A. L. L. R. M. May, “How viruses spread among computers and people,” Science, New Series, vol. 292, no. 5520, pp. 1316–1317, May 2001. [11] N. C. Valler, B. A. Prakash, H. Tong, M. Faloutsos, and C. Faloutsos, “Epidemic spread in mobile ad hoc networks: Determining the tipping point,” in Proc. 10th Intl. IFIP TC 6 Conf. Netw. - Volume Part I. Berlin, Heidelberg: Springer-Verlag, 2011. [12] E. Yanmaz, “Epidemic propagation in overlaid wireless networks,” in IEEE Global Communications Conference (GLOBECOM 2008), New Orleans, LA, USA, Nov 2008. [13] A. B. M. Gharbieh, H. ElSawy and M.-S. Alouini, “Spatiotemporal stochastic modeling of iot enabled cellular networks: Scalability and stability analysis,” in IEEE Global Commun. Conf. (Globecom 2016), Washington D.C, USA, Dec. 2016. [14] D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic geometry and its applications, ser. Wiley series in probability and mathematical statisitics. Chichester, W. Sussex, New York: Wiley, 1987. [15] J. Dall and M. Christensen, “Random geometric graphs,” Phys. Rev. E, vol. 66, p. 016121, Jul 2002. [16] A. Marttinen, A. M. Wyglinski, and R. Jntti, “Statistics-based jamming detection algorithm for jamming attacks against tactical manets,” in IEEE Mil. Commun. Conf. (MILCOM 2014), Baltimore, USA, Oct 2014. [17] R. Sanchez, J. Evans, and G. Minden, “Networking on the battlefield: challenges in highly dynamic multi-hop wireless networks,” in IEEE Mil. Commun. Conf. (MILCOM 1999), 1999. [18] R. Pastor-Satorras, C. Castellano, P. Van Mieghem, and A. Vespignani, “Epidemic processes in complex networks,” Rev. Mod. Phys., vol. 87, pp. 925–979, Aug 2015. [19] J. Marro and R. Dickman, Nonequilibrium Phase Transitions in Lattice Models. New York, USA: Cambridge University Press, 1999, ch. The contact process. [20] J. Gorski, F. Pfeuffer, and K. Klamroth, “Biconvex sets and optimization with biconvex functions: a survey and extensions,” Mathematical Methods of Operations Research, vol. 66, no. 3, pp. 373–407, 2007. [Online]. Available: http://dx.doi.org/10.1007/s00186-007-0161-1 [21] J. K. Hunter and B. Nachtergaele, Applied Analysis. World Scientific, 2001, ch. The Contraction Mapping Theorem. [22] Z. Cvetkovski, Inequalities: Theorems, Techniques and Selected Problems, Springer, Berlin, Heidelberg, 2012, ch. Convexity, Jensen’s Inequality, pp. 69–77.